nccgroup / Solitude
Solitude is a privacy analysis tool that enables anyone to conduct their own privacy investigations. Whether a curious novice or a more advanced researcher, Solitude makes the process of evaluating user privacy within an app accessible for everyone.
☆372Updated 3 years ago
Alternatives and similar repositories for Solitude:
Users that are interested in Solitude are comparing it to the libraries listed below
- Learning Shodan through katas☆464Updated 4 years ago
- Harden your Chrome browser via enterprise policy.☆283Updated 2 years ago
- Penetrum LLC opensource security tool list.☆652Updated 2 years ago
- DNS covert channel implant for Red Teams.☆732Updated 5 years ago
- Lookyloo is a web interface that allows users to capture a website page and then display a tree of domains that call each other.☆704Updated this week
- Private key usage verification☆428Updated 3 months ago
- This repo contains logstash of various honeypots☆175Updated 5 years ago
- OS image for the PiRogue based on Debian 12☆154Updated 7 months ago
- A modular OSINT honeypot for blue teamers☆333Updated last year
- Yet Another Yara Automaton - Automatically curate open source yara rules and run scans☆272Updated last year
- A research-based pihole list to reduce tracking by Apple and Google☆314Updated last year
- Pandora is an analysis framework to discover if a file is suspicious and conveniently show the results☆258Updated this week
- High speed/Low cost CommonCrawl RegExp in Node.js☆245Updated 11 months ago
- Repository for the Open Security Reference Architecture☆125Updated 2 months ago
- A Passive SSH back-end and scanner.☆103Updated last week
- Vendor Security Model Contract☆98Updated 2 years ago
- Shared Blogs and Notebooks☆473Updated 9 months ago
- Repository demonstrating the Capital One breach on your AWS account☆241Updated 4 years ago
- List of the tools and usage☆232Updated 2 years ago
- Utility to find AES keys in running processes☆334Updated last year
- Anteater - CI/CD Gate Check Framework☆177Updated last year
- Web on top of any protocol☆114Updated 4 years ago
- ☆318Updated 3 years ago
- Collection of legal threats against good faith Security Researchers; vulnerability disclosure gone wrong. A continuation of work started …☆294Updated last month
- Extract and Visualize Data from URLs using Unfurl☆655Updated this week
- Finding potential software vulnerabilities from git commit messages☆410Updated last year
- An open source intelligence tool to crawl the graph of certificate Alternate Names☆347Updated last year
- App that simplifies building decision trees to model adverse scenarios☆202Updated 8 months ago
- A tool to hunt for credentials in github wild AKA git*hunt☆293Updated 2 years ago
- An Open Letter to the OWASP Board☆106Updated last year